Academic literature on the topic 'Iot security solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Iot security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Iot security solutions"

1

Kotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.

Full text
Abstract:
Abstract: With the accelerating pace of technological advancement, demand for IoT app development is at an all-time high. Statistic predicts that $1.1 trillion will be spent globally on IoT. (approx.).Modern IoT apps and solutions will unquestionably become more popular as a result of this. Who will get the newest item into consumers' hands first among manufacturers is still a point of contention. Companies can profit much from IoT app development, but one of the key considerations is security. This post focused on IoT security issues and solutions. IoT solutions can be implemented by business
APA, Harvard, Vancouver, ISO, and other styles
2

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (2021): 3654. http://dx.doi.org/10.3390/s21113654.

Full text
Abstract:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and h
APA, Harvard, Vancouver, ISO, and other styles
3

Минаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Full text
Abstract:
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современ
APA, Harvard, Vancouver, ISO, and other styles
4

Sonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.

Full text
Abstract:
The IOT is changing the way we communicate and interact across businesses, enabling unprecedented productivity, efficiency, and data storage simulation. Development of IOT has brought many benefits but also significant challenges to network security. This article explores the key challenges in securing IoT environments, including device diversity, limited budgets, lack of security protocols, and vulnerability of transmitted information. Evaluate solutions such as the use of lightweight encryption algorithms, zerotrust architectures, and AI driven security systems to assess their potential effe
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Full text
Abstract:
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best
APA, Harvard, Vancouver, ISO, and other styles
6

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limi
APA, Harvard, Vancouver, ISO, and other styles
7

Kuraś, Paweł, Patryk Organiściak, Bartosz Kowal, et al. "IOT COMMUNICATION SECURITY: CHALLENGES AND SOLUTIONS." Zeszyty Naukowe SGSP 2, no. 88 (2024): 69–90. http://dx.doi.org/10.5604/01.3001.0054.3829.

Full text
Abstract:
This paper investigates the obstacles and resolutions concerning the security of communicationin the Internet of Things (IoT). It commences with a discussion of the remarkable proliferationof internet-connected devices, ranging from personal computers to mobile devices, and now tothe era of IoT and IoE. The paper illuminates the impact of IoT on network addresses, leading tothe depletion of IPv4 addresses and the necessity for address translation services. Subsequently,the article delves into the risks confronted by IoT systems, encompassing physical and digitalassaults, unauthorized access, s
APA, Harvard, Vancouver, ISO, and other styles
8

Tawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions." Applied Sciences 10, no. 12 (2020): 4102. http://dx.doi.org/10.3390/app10124102.

Full text
Abstract:
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying (a) different security and privacy issues, (b) approaches used to secure the components of IoT-based environments and systems, (c) existing security solutions, and (d) the best privacy models necessary and suitable for different layers
APA, Harvard, Vancouver, ISO, and other styles
9

Krishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges due to their resource constraints and widespread deployment in critical applications. This research examines lightweight cryptographic approaches that can provide robust security for IoT communication while operating within the severe computational, memory, and energy limitations of IoT devices. Through systematic analysis of existing lightweight cryptographic primitives, protocols, and frameworks, this paper identifies the most promising solutions for securing IoT ecosystems. Our finding
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Akshay, Kumar Gaurav, Edidiong, and Nitesh Kumar. "Security and Privacy for Internet of Things: Challenges and Solutions." JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING 6, no. 1 (2025): 12–22. https://doi.org/10.51682/jiscom.v6i1.68.

Full text
Abstract:
The Internet of Things (IoT) has grown to unprecedented scales in the healthcare, transportation, and even smart homes industries, bringing unprecedented convenience and operational efficiency. However, the strength of such proliferation of IoT devices has raised an exceptionally high and increasing level of security and privacy issues. Since many IoT devices are also resource-constrained devices that offer minimal encryption and authentication protocols, this makes them more vulnerable to cyberattacks. This paper comprehensively reviewed the security risks of IoT devices, networks, and data m
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Iot security solutions"

1

Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.

Full text
Abstract:
Il y a quelques années, un incident de cybersécurité aurait pu facilement être le scénario d'un film hollywoodien : des attaquants ont exploité un point d'entrée inattendu : un thermomètre intelligent dans l'aquarium du hall d'un casino. Cet objet connecté avait accès au réseau du casino, et les pirates ont réussi à le compromettre. Ils ont ensuite utilisé ce point d'entrée initial pour accéder à d'autres parties du réseau et ont finalement exfiltré 20 Go de données sensibles, y compris des informations sur les clients ”gros joueurs”.Cet exploit audacieux met en évidence la vulnérabilité des a
APA, Harvard, Vancouver, ISO, and other styles
2

Galiulina, Irina, and Patrik Karlstén. "The suitability of LoRaWAN for battery powered security solutions." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232130.

Full text
Abstract:
Many conventional forms of communication technology, such as Wi-Fi, 3G/4G or cable, require a lot of power. For battery powered devices that need to last a long time on a single charge, one alternative is the low-power, long range technology LoRaWAN. This thesis tries to answer the question how well do the properties of LoRaWAN meet the requirements for a battery powered security solution? Two identical prototype remote motion detectors were implemented for this purpose. The results show that while the prototypes do not meet the requirements for energy efficiency, LoRaWAN as a technology easil
APA, Harvard, Vancouver, ISO, and other styles
3

Edman, Johan, and Wilhelm Ågren. "Legal and Security Issues of Data Processing when Implementing IoT Solutions in Apartments." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277917.

Full text
Abstract:
The concept of the Internet of Things (IoT) and connected devices is a growing trend. New ways to integrate them with Smart Home Technology emerge each day. The use of sensors in IoT solutions enables large scale data collection that can be used in various ways. The European Union recently enforced a General Data Protection Regulation (GDPR) that sets guidelines for the collection and processing of personal information. The communication protocol M-Bus is a European standard (EN 13757-x) mainly used for remote reading of electrical, gas and water meters. M-Bus is being integrated with sensors
APA, Harvard, Vancouver, ISO, and other styles
4

Kandi, Mohamed Ali. "Lightweight key management solutions for heterogeneous IoT." Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2575.

Full text
Abstract:
L'Internet des objets (IdO) est une technologie émergente ayant le potentiel d'améliorer notre quotidien de différentes façons. Elle consiste à étendre la connectivité au-delà des appareils standards (tels que les ordinateurs, les tablettes et les smartphones) à tous les objets du quotidien. Ces appareils, également appelés objets intelligents, peuvent alors collecter des données de leur entourage, collaborer pour les traiter puis agir sur leur environnement. Cela augmente leurs fonctionnalités et leur permet d'offrir divers services au profit de la société. Cela dit, de nombreux défis ralenti
APA, Harvard, Vancouver, ISO, and other styles
5

Lukacs, Andrea. "Investigation of IoT camera solutions in Smart Cities from a Technology, Information Security and Trust point of view." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79300.

Full text
Abstract:
Smart cities utilize IoT cameras in a rushing pace. However, these high technological connected devices are back doors to safe systems. Implementation of high technological solutions without concerning other important aspects as information security and the factor of trust violates not only the quality aspect of the solutions, but also breaches the privacy of individuals. Secure solutions that reserve the trust of individuals with the help of high technological solutions is therefore significant. This study is aimed to investigate and find answer to how IoT camera solutions for smart cities ca
APA, Harvard, Vancouver, ISO, and other styles
6

Tewolde, Vincent. "Comparison of authentication options forMQTT communication in an IoT basedsmart grid solution." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18276.

Full text
Abstract:
Background. Smart grid is a new technology that focuses on utilising renewable energyalongside the current infrastructure. It aims to contribute to a sustainable future by implementingIoT devices in the electrical grid to adjust electricity flow and increase energyefficiency. By combining the current infrastructure with information technology manysecurity questions arise. This paper focuses on the authentication of the IoT devicesconnected with the MQTT protocol.Objectives. The study aims to discover a preferable MQTT authentication methodadapted for Techinova’s infrastructure with their requi
APA, Harvard, Vancouver, ISO, and other styles
7

Srour, Hassan. "Développement d’un électrolyte à base de liquide ionique pour accumulateur au Lithium." Thesis, Lyon 1, 2013. http://www.theses.fr/2013LYO10160/document.

Full text
Abstract:
Dans les accumulateurs au lithium, l'électrolyte joue un rôle important car ses propriétés physicochimiques et électrochimiques conditionnent l'efficacité du générateur électrochimique. Actuellement, les électrolytes organiques utilisés induisent des difficultés pour la mise en oeuvre et l'utilisation de la batterie (composants volatils et inflammables). De nouveaux électrolytes à base de sels fondus à température ambiante, dit liquides ioniques, sont des candidats potentiels plus sécuritaires (faible inflammabilité, basse pression de vapeur saturante, point éclair élevé), qui présentent en ou
APA, Harvard, Vancouver, ISO, and other styles
8

Arlotti, Luca. "Studio di fattibilità tecnico economico per l'automazione di un reparto presse tramite l'applicazione di cobot." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/16184/.

Full text
Abstract:
In questa tesi viene eseguita una ricerca applicativa sull'implementazione di un robot collaborativo, con lo scopo di sgravare gli operatori da mansioni ripetitive e impiegare il loro tempo per migliorare la qualità della produzione e dei prodotti finali. Dopo una parte introduttiva dedicata alla descrizione dei punti salienti dell’Industria 4.0 e alle scelte che il mercato propone riguardo ai robot collaborativi, si è preso in considerazione il caso specifico di ASA San Marino: l’analisi del processo produttivo del reparto presse ha posto la lente di ingrandimento sulle mansioni che il si
APA, Harvard, Vancouver, ISO, and other styles
9

Nizzi, Francesca. "Security in IoT systems - Issues and Solutions." Doctoral thesis, 2020. http://hdl.handle.net/2158/1185966.

Full text
Abstract:
With the term Internet of Things (IoT) we define an eco-system formed by interconnected “smart” objects (things) that: are connected, able to interact,and exchange and elaborate data. To communicate its data and to have access to aggregate information of neighbors make a thing recognizable and it is the basis to fuel it with ‘intelligence’, as is the ability to autonomously re-act to changes in the environment. As an example, an alarm clock could ring earlier than expected according to the expected travel time needed to reach the destination, an heating system could adjust its settin
APA, Harvard, Vancouver, ISO, and other styles
10

Rashid, Adnan. "Resilient IoT Systems – Issues and Solutions." Doctoral thesis, 2022. http://hdl.handle.net/2158/1263242.

Full text
Abstract:
The Internet of Thing (IoT) has been one of the main focus areas of the research community in recent years, their peculiar requirements help net- work administrators to design and ensure the functionalities and resources of each device. Generally, two types of devices—constrained and uncon- strained devices—are typical in the IoT environment. Devices with limited resources—for example, sensors and actuators—are known as constrained de- vices. The unconstrained devices include gateways or border routers. Such devices are challenging in terms of their deployment because of their con- nectivity,
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Iot security solutions"

1

Sharma, Smita, Manikandan Thirumalaisamy, Balamurugan Balusamy, and Naveen Chilamkurti. Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities. Chapman and Hall/CRC, 2024. https://doi.org/10.1201/9781003459835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Caregorodcev, Anatoliy, and Sergey Romanovskiy. Digital sovereignty: current problems and solutions. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2122428.

Full text
Abstract:
The monograph examines the concept and components of the digital sovereignty of the state in the context of global processes of technological transformation. It is shown that digital sovereignty is a factor that is directly involved in the formation of traditional spheres of life of the state and society, being an integral part of state sovereignty as a whole. For employees of public administration bodies whose activities are related to ensuring information interaction between society and social media, as well as for teachers, students and postgraduates studying in an enlarged group of special
APA, Harvard, Vancouver, ISO, and other styles
3

Shumilina, Vera, Galina Krohicheva, Yuliya Mezentseva, et al. Management of enterprises and organizations: problems and solutions. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/monography_6180d1003e3fd1.15351579.

Full text
Abstract:
At the present stage in the global information society, a new economic structure is being actively formed - digital. There is a digitalization of economic processes and the penetration of information technologies into all spheres of activity. There are new requirements for the sources of competitive advantages of enterprises and effective concepts of their functioning and management.
 This monograph is a collective work of teachers, students, graduate students, undergraduates of the Department of Economic Security, Accounting and Law, Don State Technical University, Rostov State Economic
APA, Harvard, Vancouver, ISO, and other styles
4

Russkevich, Evgeniy. Criminal law and "digital crime": problems and solutions. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.

Full text
Abstract:
The monograph is devoted to a complex of theoretical and applied problems of adapting the domestic mechanism of criminal law protection to the "digitalization" of crime in the conditions of the formation of the information society. Along with general theoretical issues, foreign criminal legislation and provisions of international law are being thoroughly analyzed. The paper presents an updated criminal-legal description of crimes in the field of computer information, including novelties of Russian criminal legislation - unlawful impact on the critical information infrastructure of the Russian
APA, Harvard, Vancouver, ISO, and other styles
5

Caregorodcev, Anatoliy, Sergey Romanovskiy, and Sergey Volkov. Risk analysis in the processes of ensuring information security of the life cycle of financial automated information systems. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2049718.

Full text
Abstract:
One of the key elements of the development strategy of a modern organization is the solution of the task of transforming the information security risk management system. Today, more and more modern organizations are moving away from the maturity-based model in favor of a risk-based approach. The monograph examines this approach and provides recommendations for its application in credit and financial organizations.
 It may be of interest both for employees of departments whose activities are related to risk analysis and management, credit and financial organizations, and for teachers, stud
APA, Harvard, Vancouver, ISO, and other styles
6

Bragina, Zinaida, Tat'yana Vasil'kova, Natal'ya Gorbina, et al. Priorities of socio-economic development of rural areas in the context of global challenges. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1870593.

Full text
Abstract:
The monograph examines the priority areas of rural development caused by the global challenges of the economy and society as a whole. The main factors of rural development, multidirectional links between the economy of municipalities and the level of economic development and economic security of the region are noted. The most important organizational and economic mechanisms for the development of the agricultural sector are shown: state support, tax regulation, introduction of information and communication technologies and digitalization. Applied solutions for managing costs and financial resu
APA, Harvard, Vancouver, ISO, and other styles
7

Oreshina, Marina, and Andrey Garnov. Information management technologies in the context of digital transformation. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2186397.

Full text
Abstract:
The textbook provides a general description of the processes of collecting, transmitting, and storing information using information management systems in organizations and enterprises, and discusses information processing methods and tools, including data visualization using the Yandex DataLens service. The creation of a complex of interrelated models of information processes is considered, the development of methods that allow automated solutions to various problems of an applied nature is presented, ways and means of implementing information technologies are shown: methodological, informatio
APA, Harvard, Vancouver, ISO, and other styles
8

Zhukova, Galina, and Lyudmila Borisova. Mathematics. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2082652.

Full text
Abstract:
The textbook contains a systematic presentation of theoretical material that allows you to master the basic techniques and methods of researching a wide range of practical tasks. For each topic under discussion, a large number of examples and tasks developed in accordance with the work program of the discipline "Mathematics" are proposed with detailed analysis and solution. Much attention is paid to the application of mathematical methods to the study of economic problems. Provides assistance in self-preparation and self-control in mastering the discipline, including preparation for lectures a
APA, Harvard, Vancouver, ISO, and other styles
9

Anufriev, Valeriy, Yuliya Gudim, and Aytkali Kaminov. Sustainable development. Energy efficiency. Green economy. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1226403.

Full text
Abstract:
The monograph examines the problems of sustainable development and energy efficiency using the scientific and methodological approach proposed by the authors for the development of regional fuel and energy programs based on the KhMAO, the Sverdlovsk region, and the oil and gas production enterprise JSC Yuganskneftegaz, and presents the results of the environmental and economic assessment. This approach allows us to evaluate and select the most effective investment project for the utilization of associated petroleum gas from the point of view of energy, environmental and climate security on com
APA, Harvard, Vancouver, ISO, and other styles
10

Hei, Xiali. Security, Data Analytics, and Energy-Aware Solutions in the IoT. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Iot security solutions"

1

Tang, Qinghao, and Fan Du. "Solutions for IoT System Security." In Internet of Things Security: Principles and Practice. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9942-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Azmi, Amirul Azri, Zarina Mohd Hussin, and Suraya Mohammad. "Exploring IoT Security in IoT Devices." In Advances in Technology Transfer Through IoT and IT Solutions. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25178-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pallavi and Sandeep Joshi. "Security of IoT and Its Solutions." In Internet of Things Vulnerabilities and Recovery Strategies. Auerbach Publications, 2024. http://dx.doi.org/10.1201/9781003474838-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Amit. "Hardware-Assisted Security of Smart IoT Applications." In Hardware Security: Challenges and Solutions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-81213-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jawahar, P. K., S. Mubeena, V. Jean Shilpa, R. Anitha, and S. Anusooya. "Blockchain-Driven Solutions for IoT Data Security in Healthcare." In Blockchain and IoT. Chapman and Hall/CRC, 2025. https://doi.org/10.1201/9781003428886-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rai, Bipin Kumar. "Security Issues and Solutions for Healthcare Informatics." In Federated Learning for IoT Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-85559-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Jian, Manoj Kumar, and May El Barachi. "Analysis of Cyberattacks on IOT Devices in Smart Homes." In Hardware Security: Challenges and Solutions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-81213-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jain, Anshul, and Tanya Singh. "Security Challenges and Solutions of IoT Ecosystem." In Information and Communication Technology for Sustainable Development. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7166-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohanty, Jayashree, Sushree Mishra, Sibani Patra, Bibudhendu Pati, and Chhabi Rani Panigrahi. "IoT Security, Challenges, and Solutions: A Review." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6353-9_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pulkkis, Göran, Jonny Karlsson, and Magnus Westerlund. "Blockchain-Based Security Solutions for IoT Systems." In Internet of Things A to Z. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119456735.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Iot security solutions"

1

Tatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Apiecionek, Łukasz. "Fuzzy Network Solutions for IoT Security." In IEEE EUROCON 2025 - 21st International Conference on Smart Technologies. IEEE, 2025. https://doi.org/10.1109/eurocon64445.2025.11073458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kabir, Md Humayun, Syed Mohammad Sohel Arman, Md Babul Manik, Md Jiabul Hoque, Hassan Jaki, and Mohammad Nadib Hasan. "Enhancing Home Automation and Security with IoT-based Solutions." In 2024 International Conference on Innovations in Science, Engineering and Technology (ICISET). IEEE, 2024. https://doi.org/10.1109/iciset62123.2024.10939852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ileri, Kadir. "IoT-Based Smart Farming: Benefits, Attacks, and Security Solutions." In 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA). IEEE, 2025. https://doi.org/10.1109/ichora65333.2025.11017038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Belaadel, Youness, Houda Moudni, Hicham Zougagh, Mohamed Er-rouidi, and Samir Elouaham. "IoT Security: Trends, Challenges, and Solutions for MQTT-Based Devices." In 2024 10th International Conference on Optimization and Applications (ICOA). IEEE, 2024. http://dx.doi.org/10.1109/icoa62581.2024.10753842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shravan, M., Shital Kakad, Umar M. Mulani, Geeti Sharma, Mohit Tiwari, and Mary Shiba C. "Exploring blockchain solutions: Integrating cryptocurrency with IoT for enhanced security." In 2025 International Conference on Pervasive Computational Technologies (ICPCT). IEEE, 2025. https://doi.org/10.1109/icpct64145.2025.10941328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Traynor, Zachary A., Ian M. Curtin, Calvin T. Henggeler, and Ahmed Iyanda Sulyman. "Physical-layer security solutions for IoT devices using Radio Frequency Fingerprints." In 2024 International Conference on Computing, Internet of Things and Microwave Systems (ICCIMS). IEEE, 2024. http://dx.doi.org/10.1109/iccims61672.2024.10690481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nikhare, Niharika, Kashish Pelne, Tanushree Parkhi, Alina Sabahat Raza, Kamlesh Kalbande, and Ashvini Bais. "Innovative Home Security Systems: A Comparative Analysis of IoT-Driven Solutions." In 2025 3rd International Conference on Advancement in Computation & Computer Technologies (InCACCT). IEEE, 2025. https://doi.org/10.1109/incacct65424.2025.11011476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Achouri, Youssouf, Rima Djellab, Khaled Hamouid, and Ahmed-Sami Berkani. "Security Considerations for Internet of Things (IoT): Exploring Quantum Computing Solutions." In 2024 1st International Conference on Innovative and Intelligent Information Technologies (IC3IT). IEEE, 2024. https://doi.org/10.1109/ic3it63743.2024.10869424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Ankur, and Dinesh Chandra Misra. "Advanced IoT Security Solutions with Deep Learning and Big Data Analytics." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983066.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Iot security solutions"

1

Howell, Gema. Security Analysis of IoT Management Solutions for First Responders. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Latorre, Lucia, Eduardo Rego, and Lorenzo De Leo. Tech Report: Internet of Things. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013422.

Full text
Abstract:
The following report delves into the essential components that make up IoT systems, illustrative examples of the IoT in action, and its broad spectrum of applications spanning multiple industries, highlighting the tangible benefits it delivers. Furthermore, it addresses the burgeoning IoT landscape in Latin America and the Caribbean, underscoring the unique opportunities and challenges faced in the region. The discussion also covers critical considerations surrounding IoT security, ethics, and the challenges and risks inherent to its deployment. Best practices for implementing IoT solutions ar
APA, Harvard, Vancouver, ISO, and other styles
3

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
APA, Harvard, Vancouver, ISO, and other styles
4

Latorre, Lucia, Valeria Lovaisa, Lorenzo De Leo, Alexander Riobó, Eduardo Riego, and Mariana Gutierrez. Tech Report: Edge Computing. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013021.

Full text
Abstract:
The adoption of edge computing in Latin America and the Caribbean (LAC) underscores its ability to address the regions unique challenges, including limited connectivity and the need to process data in remote locations. Innovative projects in smart public lighting, urban security, and sustainable resource management highlight the transformative impact of edge computing in improving quality of life and operational efficiency. Looking ahead, edge computing stands at the forefront of technological innovation. Deeper integration with artificial intelligence and the rise of 5G will unlock fresh oppo
APA, Harvard, Vancouver, ISO, and other styles
5

Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.

Full text
Abstract:
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained devices. This decision emerged from a rigorous, multi-round lightweight cryptography standardization process. The Ascon family includes a suite of cryptographic primitives that provide Authenticated Encryption with Associated Data (AEAD), hash function, and eXtendable Output Function (XOF) capabilities. The Ascon family is characterized by lightw
APA, Harvard, Vancouver, ISO, and other styles
6

Phillips, Paul. The Application of Satellite-based Internet of Things for New Mobility. SAE International, 2024. http://dx.doi.org/10.4271/epr2024001.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">With the increased use of devices requiring the Internet of Things (IoT) to enable “New Mobility,” the demand for satellite-enabled IoT is growing steadily, owing to the extensive coverage provided by satellites (over existing ground-based infrastructure). Satellite-based IoT provides precise and real-time vehicle location and tracking services, large-scale geographical vehicle and/or infrastructure monitoring, and increased coverage for remote locations where it may not be possible to install ground-based solutions.<
APA, Harvard, Vancouver, ISO, and other styles
7

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
8

Young, Allison, Susannah Davidson, Emily Wilson, Brenton Begay, and Angela Urban. The Military and planning for lithium-ion battery recycling4.78 MB). Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/49368.

Full text
Abstract:
Understanding the military challenges related to lithium-ion battery disposal and learning about current and future trends in recycling efforts can inform safer and less environmentally destructive end-of-life solutions. Established lead-acid battery recycling methods were compared to the still-evolving lithium-ion battery recycling processes. Executive Order (EO) 13817, EO 13953, and EO 14017 have prioritized the identification of critical minerals, including minerals necessary for lithium-ion battery production, and the need to strengthen supply chains as vital to national security. To suppo
APA, Harvard, Vancouver, ISO, and other styles
9

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
10

Research Team, Karamoja–Turkana Community. Community Solutions to Insecurity Along the Uganda–Kenya Border. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/ids.2023.057.

Full text
Abstract:
In the Karamoja and Turkana border regions of Uganda and Kenya, there is widespread violence including armed robbery, rape, and human rights abuses, yet community complaints about failures of governance remain largely unaddressed. This Policy Briefing highlights how different insecurities reinforce one another in ways exacerbated by the international border. It stresses the need for fulfilment of the two governments’ commitments to cross-border solutions, and suggests that international policy actors can help communities gain leverage with governments towards building trustworthy and effective
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!